Password Policy - Phishing Prevention
MitM
Member Posts: 622 ■■■■□□□□□□
One way I've seen as an attempt to combat phishing is to have a password management policy that requires employees to enter a bad password when they are prompted to login from a link that they clicked in email.
The thinking is a legitimate site will not accept a bad password but a phishing site would
Any thoughts on this? Is a good/realistic idea
The thinking is a legitimate site will not accept a bad password but a phishing site would
Any thoughts on this? Is a good/realistic idea
Comments
-
UnixGuy Mod Posts: 4,570 ModHow would the phishing victim know that they are on a malicious link? The reason they give away their passwords is because they think they're browsing a legitimate link.
2-Factor authentication, and a continuous education & awareness program are the only two effective remedies that I know of. -
MitM Member Posts: 622 ■■■■□□□□□□That's exactly the point, they wouldn't. That's why the policy would require them to always enter a false password, any time that they are prompted to login after clicking a link from an email
-
Jon_Cisco Member Posts: 1,772 ■■■■■■■■□□My biggest concern with this is it might encourage them to click a link in the first place. I would not want to encourage users to click any links or provide any input but I do think it's an interesting idea.
-
scaredoftests Mod Posts: 2,780 ModAgreed. And some people, even though they are told repeatedly NOT to click any link, will then do so after doing the above..Never let your fear decide your fate....
-
paul78 Member Posts: 3,016 ■■■■■■■■■■@MitM - usually what I recommend is that if an end-user gets an email with a link in it claiming to be from a site that the end-user accesses or has an account; instead of clicking on the link, it's better to just open a browser and enter the website that's known to the end-user.
-
tedjames Member Posts: 1,182 ■■■■■■■■□□We train our users not to click on links right away. First, hover over them to show the actual link. Then, key it in manually. And if they are not sure, they can always forward the email as an attachment to us to check out first. We have a really security-savvy group of users.
-
paul78 Member Posts: 3,016 ■■■■■■■■■■tedjames said:We train our users not to click on links right away. First, hover over them to show the actual link. Then, key it in manually. And if they are not sure, they can always forward the email as an attachment to us to check out first. We have a really security-savvy group of users.
-
Johnhe0414 Registered Users Posts: 191 ■■■■■□□□□□Education and training - we use a web blast for continuous tips and warnings throughout the week.
Current: Network+ | Project+Working on: PMP -
MitM Member Posts: 622 ■■■■□□□□□□tedjames said:We train our users not to click on links right away. First, hover over them to show the actual link. Then, key it in manually. And if they are not sure, they can always forward the email as an attachment to us to check out first. We have a really security-savvy group of users.
-
paul78 Member Posts: 3,016 ■■■■■■■■■■
100% agree. This is the one thing I hate about O365 ATP Safe Links. It rewrites the URL
Just my 2 cents - but I find it preferable to use O365 ATP vs url inspection. I'm not a fan of having end-users inspect the URL and then clicking on the link because most end-users are not able to detect a malicious URL - and even a sophisticated user can be fooled with an IDN. I rather that the end-user simply access the site that they believe is attempting to send them an email.BTW - the latest version of Outlook decodes the ATP URL and displays the actual original URL. Perhaps you haven't patched <just kidding> -
MitM Member Posts: 622 ■■■■□□□□□□paul78 said:
100% agree. This is the one thing I hate about O365 ATP Safe Links. It rewrites the URL
BTW - the latest version of Outlook decodes the ATP URL and displays the actual original URL. Perhaps you haven't patched <just kidding>
na01.safelinks.protection.outlook.com/?URL=<somewhat of the actual link>
-
UnixGuy Mod Posts: 4,570 ModMitM said:That's exactly the point, they wouldn't. That's why the policy would require them to always enter a false password, any time that they are prompted to login after clicking a link from an email
-
MitM Member Posts: 622 ■■■■□□□□□□UnixGuy said:MitM said:That's exactly the point, they wouldn't. That's why the policy would require them to always enter a false password, any time that they are prompted to login after clicking a link from an email
-
paul78 Member Posts: 3,016 ■■■■■■■■■■
hmmmm What version? I'm running 1803 (Build 9126.2295). When you hover the link, it shows
na01.safelinks.protection.outlook.com/?URL=<somewhat of the actual link>I'm running 1811 (Build 110029.20079). We enable Targeted releases.I just poked around and I see the same behavior but rarely. I notice that the original URL is NOT displayed only if the HTML uses nested tables.
-
yoba222 Member Posts: 1,237 ■■■■■■■■□□Malicious websites can infect end-users by simply visiting the site--no interaction needed. Encouraging end users to visit a potentially malicious website is a bad idea.A+, Network+, CCNA, LFCS,
Security+, eJPT, CySA+, PenTest+,
Cisco CyberOps, GCIH, VHL,
In progress: OSCP -
MitM Member Posts: 622 ■■■■□□□□□□yoba222 said:Malicious websites can infect end-users by simply visiting the site--no interaction needed. Encouraging end users to visit a potentially malicious website is a bad idea.
While an interesting thought, I don't see it as practical -
LionelTeo Member Posts: 526 ■■■■■■■□□□How is it entering a bad password going to help against a phishing site that would always prompt incorrect username or password? Also, is this policy enforce in its technological control? What about employee simply choose to enter their correct password on first login.
-
MitM Member Posts: 622 ■■■■□□□□□□LionelTeo said:How is it entering a bad password going to help against a phishing site that would always prompt incorrect username or password? Also, is this policy enforce in its technological control? What about employee simply choose to enter their correct password on first login.